Vulnerability identifier: #VU40761
Vulnerability risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-310
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
phpMyAdmin
Web applications /
Remote management & hosting panels
Vendor: phpMyAdmin
Description
The vulnerability allows a remote non-authenticated attacker to manipulate data.
libraries/Config.class.php in phpMyAdmin 4.0.x before 4.0.10.10, 4.2.x before 4.2.13.3, 4.3.x before 4.3.13.1, and 4.4.x before 4.4.6.1 disables X.509 certificate verification for GitHub API calls over SSL, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
Mitigation
Install update from vendor's website.
Vulnerable software versions
phpMyAdmin: 4.0.0 - 4.0.10.9, 4.2.0 - 4.2.13.2, 4.3.0 - 4.3.13, 4.4.0 - 4.4.6
External links
http://cxsecurity.com/issue/WLB-2015050095
http://lists.opensuse.org/opensuse-updates/2015-07/msg00008.html
http://packetstormsecurity.com/files/131954/phpMyAdmin-4.4.6-Man-In-The-Middle.html
http://www.debian.org/security/2015/dsa-3382
http://www.phpmyadmin.net/home_page/security/PMASA-2015-3.php
http://www.securityfocus.com/archive/1/535547/100/0/threaded
http://www.securityfocus.com/bid/74660
http://www.securitytracker.com/id/1032403
http://github.com/phpmyadmin/phpmyadmin/commit/5ebc4daf131dd3bd646326267f3e765d0249bbb4
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.